Conversation
|
@codex review this |
Co-authored-by: Codex <noreply@openai.com>
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: e4d044c3cf
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
Co-authored-by: Codex <noreply@openai.com>
6ca9bfc to
09f53a1
Compare
|
Rebased this branch on top of #13703. That precursor PR isolates the helper semantics so the guardian-specific behavior change can be reviewed separately. |
|
Rebased this branch on top of #13703. That precursor PR isolates the SandboxPermissions helper semantics so the guardian-specific behavior change can be reviewed separately. |
Co-authored-by: Codex <noreply@openai.com>
ce8dbdd to
4bb939f
Compare
Co-authored-by: Codex <noreply@openai.com>
dc00757 to
d70e046
Compare
Co-authored-by: Codex <noreply@openai.com>
|
@codex review this |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 1904fe78ec
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
2f6c83d to
282a21a
Compare
|
@codex review this |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 5846ca060f
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
|
@codex review this |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 7fdebc4f49
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
|
@codex review this |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: fd70f82592
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
|
@codex review this |
There was a problem hiding this comment.
💡 Codex Review
codex/codex-rs/core/src/tools/orchestrator.rs
Lines 242 to 243 in 364c4dd
allow_on_request_network_prompt only checks AskForApproval::OnRequest. In guardian mode, a sandbox-denied command with network_policy_decision is returned immediately instead of entering the approval/retry flow, so the guardian never reviews managed-network escalation. This breaks the stated "guardian mirrors OnRequest" behavior for blocked network access.
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
dylan-hurd-oai
left a comment
There was a problem hiding this comment.
Some non-blocking comments - overall this feels pretty reasonable. Excited to try it out!
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
Co-authored-by: Codex <noreply@openai.com>
b33441a to
125a5ea
Compare
|
@codex review this |
|
@codex review this |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 125a5ea57c
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
Co-authored-by: Codex <noreply@openai.com>
Summary
on-requestapprovals in command, patch, sandbox-retry, and managed-network approval pathsfeatures.guardian_approvalinstead of exposing a publicapproval_policy = guardianmodeOnRequestapprovals to the guardian subagent when the feature is enabled, without changing the public approval-mode surfacePublic model
features.guardian_approvalapproval_policy = on-requestkeeps the same approval boundaries but sends those approval requests to the guardian reviewer instead of the user/experimentalonly persists the feature flag; it does not rewriteapproval_policyguardianapproval mode in this PRGuardian reviewer
approval_policy = nevergpt-5.4when the current provider exposes it, otherwise falls back to the parent turn's active modelrisk_score < 80Review context and policy
OnRequestapproval semantics rather than introducing a separate approval policyrequire_escalatedrequests follow the same approval surface asOnRequest; the difference is only who reviews them<guardian_truncated ... />markers so large payloads stay boundedchangespayload)Guardian network behavior
Out of scope / follow-ups
serde_jsonpreserve-order incodex-coreand then simplify the guardian action rendering further